354 research outputs found

    Design, implementation and validation of AI-inspired information systems

    Get PDF
    While there is an emerging and always-growing interest for novel paradigms appeared recently (e.g., social networks, Cloud computing, NoSQL databases, Big Data, and so forth), Artificial Intelligence (AI) always plays a critical role in next-generation Information Systems. Indeed, as technology and paradigms pervade our life, there is a challenging need for smarter and more sophisticated Information Systems, for instance using innovative methodologies like crowdsourcing. As a consequence, it is natural to foresee the advancement of a novel class of Information Systems, which we call as AI-Inspired Information Systems. Basically, these are Information Systems which incorporate in their critical layers (i.e., design, implementation, validation) AI methodologies, yet extending their roots to classical foundations, with, indeed, exciting innovations

    Virus Spread Modeling and Simulation: A Behavioral Parameters Approach and Its Application to Covid-19

    Get PDF
    How a virus spread on a network is a really important topic and even more important is to classify the danger of a virus. With this goal in mind, we investigate the characteristics that define the most deadly virus. Moreover, we aim to provide a simplified discrete-time simulation, described by few parameters, as a straightforward alternative to more complex models of diseases diffusion. The simulation is used to model the spread of the infection, and the obtained results are then analyzed to understand how the virus' behavior varies by changing its characteristics and the network topology

    Inverse Tree-OLAP: Definition, Complexity and First Solution

    Get PDF
    Count constraint is a data dependency that requires the results of given count operations on a relation to be within a certain range. By means of count constraints a new decisional problem, called the Inverse OLAP, has been recently introduced: given a flat fact table, does there exist an instance satisfying a set of given count constraints? This paper focus on a special case of Inverse OLAP, called Inverse Tree-OLAP, for which the flat fact table key is modeled by a Dimensional Fact Model (DFM) with a tree structure

    Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks

    Full text link
    Neural network approaches are machine learning methods that are widely used in various domains, such as healthcare and cybersecurity. Neural networks are especially renowned for their ability to deal with image datasets. During the training process with images, various fundamental mathematical operations are performed in the neural network. These operations include several algebraic and mathematical functions, such as derivatives, convolutions, and matrix inversions and transpositions. Such operations demand higher processing power than what is typically required for regular computer usage. Since CPUs are built with serial processing, they are not appropriate for handling large image datasets. On the other hand, GPUs have parallel processing capabilities and can provide higher speed. This paper utilizes advanced neural network techniques, such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST VGG16, and our proposed models, to compare CPU and GPU resources. We implemented a system for classifying Autism disease using face images of autistic and non-autistic children to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It was observed that GPU outperformed CPU in all tests conducted. Moreover, the performance of the neural network models in terms of accuracy increased on GPU compared to CPU

    Frequent subgraph mining from streams of linked graph structured data

    Get PDF
    Nowadays, high volumes of high-value data (e.g., semantic web data) can be generated and published at a high velocity. A collection of these data can be viewed as a big, interlinked, dynamic graph structure of linked resources. Embedded in them are implicit, previously unknown, and potentially useful knowledge. Hence, ecient knowledge discovery algorithms for mining frequent subgraphs from these dynamic, streaming graph structured data are in demand. Some existing algorithms require very large memory space to discover frequent subgraphs; some others discover collections of frequently co-occurring edges (which may be disjoint). In contrast, we propose|in this paper|algorithms that use limited memory space for discovering collections of frequently co-occurring connected edges. Evaluation results show the effectiveness of our algorithms in frequent subgraph mining from streams of linked graph structured data

    Data analytics on the board game Go for the discovery of interesting sequences of moves in joseki

    Get PDF
    Data analytics on the board game Go for the discovery of interesting sequences of moves in josek

    Approximation to expected support of frequent itemsets in mining probabilistic sets of uncertain data

    Get PDF
    Knowledge discovery and data mining generally discovers implicit, previously unknown, and useful knowledge from data. As one of the popular knowledge discovery and data mining tasks, frequent itemset mining, in particular, discovers knowledge in the form of sets of frequently co-occurring items, events, or objects. On the one hand, in many real-life applications, users mine frequent patterns from traditional databases of precise data, in which users know certainly the presence of items in transactions. On the other hand, in many other real-life applications, users mine frequent itemsets from probabilistic sets of uncertain data, in which users are uncertain about the likelihood of the presence of items in transactions. Each item in these probabilistic sets of uncertain data is often associated with an existential probability expressing the likelihood of its presence in that transaction. To mine frequent itemsets from these probabilistic datasets, many existing algorithms capture lots of information to compute expected support. To reduce the amount of space required, algorithms capture some but not all information in computing or approximating expected support. The tradeoff is that the upper bounds to expected support may not be tight. In this paper, we examine several upper bounds and recommend to the user which ones consume less space while providing good approximation to expected support of frequent itemsets in mining probabilistic sets of uncertain data
    • …
    corecore